SUSE-SU-2017:0940-1: Security update for audiofile

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Apr 5 10:17:31 MDT 2017


   SUSE Security Update: Security update for audiofile
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0940-1
Rating:             low
References:         #1026978 #1026979 #1026980 #1026981 #1026982 
                    #1026983 #1026984 #1026985 #1026986 #1026987 
                    #1026988 #949399 
Cross-References:   CVE-2015-7747 CVE-2017-6827 CVE-2017-6828
                    CVE-2017-6829 CVE-2017-6830 CVE-2017-6831
                    CVE-2017-6832 CVE-2017-6833 CVE-2017-6834
                    CVE-2017-6835 CVE-2017-6836 CVE-2017-6837
                    CVE-2017-6838 CVE-2017-6839
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Desktop 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that fixes 14 vulnerabilities is now available.

Description:


   This audiofile update fixes the following issue:

   Security issues fixed:
   - CVE-2015-7747: Fixed buffer overflow issue when changing both number of
     channels and sample format. (bsc#949399)
   - CVE-2017-6827: heap-based buffer overflow in
     MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
   - CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp)
     (bsc#1026980)
   - CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp)
     (bsc#1026981)
   - CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp)
     (bsc#1026982)
   - CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE
     (IMA.cpp) (bsc#1026983)
   - CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock
     (MSADPCM.cpp) (bsc#1026984)
   - CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp)
     (bsc#1026985)
   - CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp)
     (bsc#1026986)
   - CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp)
     (bsc#1026988)
   - CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run
     (SimpleModule.h) (bsc#1026987)
   - CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes
     (bsc#1026978)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-542=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-542=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-542=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-542=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-542=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-542=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-542=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      audiofile-devel-0.3.6-10.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      audiofile-devel-0.3.6-10.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      audiofile-0.3.6-10.1
      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      libaudiofile1-0.3.6-10.1
      libaudiofile1-debuginfo-0.3.6-10.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      audiofile-0.3.6-10.1
      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      libaudiofile1-0.3.6-10.1
      libaudiofile1-debuginfo-0.3.6-10.1

   - SUSE Linux Enterprise Server 12-SP2 (x86_64):

      libaudiofile1-32bit-0.3.6-10.1
      libaudiofile1-debuginfo-32bit-0.3.6-10.1

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      audiofile-0.3.6-10.1
      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      libaudiofile1-0.3.6-10.1
      libaudiofile1-debuginfo-0.3.6-10.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):

      libaudiofile1-32bit-0.3.6-10.1
      libaudiofile1-debuginfo-32bit-0.3.6-10.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      audiofile-0.3.6-10.1
      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      libaudiofile1-0.3.6-10.1
      libaudiofile1-32bit-0.3.6-10.1
      libaudiofile1-debuginfo-0.3.6-10.1
      libaudiofile1-debuginfo-32bit-0.3.6-10.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      audiofile-0.3.6-10.1
      audiofile-debuginfo-0.3.6-10.1
      audiofile-debugsource-0.3.6-10.1
      libaudiofile1-0.3.6-10.1
      libaudiofile1-32bit-0.3.6-10.1
      libaudiofile1-debuginfo-0.3.6-10.1
      libaudiofile1-debuginfo-32bit-0.3.6-10.1


References:

   https://www.suse.com/security/cve/CVE-2015-7747.html
   https://www.suse.com/security/cve/CVE-2017-6827.html
   https://www.suse.com/security/cve/CVE-2017-6828.html
   https://www.suse.com/security/cve/CVE-2017-6829.html
   https://www.suse.com/security/cve/CVE-2017-6830.html
   https://www.suse.com/security/cve/CVE-2017-6831.html
   https://www.suse.com/security/cve/CVE-2017-6832.html
   https://www.suse.com/security/cve/CVE-2017-6833.html
   https://www.suse.com/security/cve/CVE-2017-6834.html
   https://www.suse.com/security/cve/CVE-2017-6835.html
   https://www.suse.com/security/cve/CVE-2017-6836.html
   https://www.suse.com/security/cve/CVE-2017-6837.html
   https://www.suse.com/security/cve/CVE-2017-6838.html
   https://www.suse.com/security/cve/CVE-2017-6839.html
   https://bugzilla.suse.com/1026978
   https://bugzilla.suse.com/1026979
   https://bugzilla.suse.com/1026980
   https://bugzilla.suse.com/1026981
   https://bugzilla.suse.com/1026982
   https://bugzilla.suse.com/1026983
   https://bugzilla.suse.com/1026984
   https://bugzilla.suse.com/1026985
   https://bugzilla.suse.com/1026986
   https://bugzilla.suse.com/1026987
   https://bugzilla.suse.com/1026988
   https://bugzilla.suse.com/949399



More information about the sle-security-updates mailing list